[1] S. Kleber, L. Maile, and F. Kargl, “Survey of Protocol Reverse Engineering Algorithms: Decomposition of Tools for Static Traffic Analysis,” IEEE Communications Surveys & Tutorials, 2018.##
[2] K. Zhang, E. L. Xu, Z. Feng, and P. Zhang, “A Dictionary Learning Based Automatic Modulation Classification Method,” IEEE Access, vol. 6, pp. 5607-5617, 2018.##
[3] R. Gupta, S. Majhi, and O. A. Dobre, “Design and Implementation of a Tree-Based Blind Modulation Classification Algorithm for Multiple-Antenna Systems,” IEEE Transactions on Instrumentation and Measurement, 2018.##
[4] T. Li, Y. Li, Y. Chen, L. J. Cimini Jr, and H. Zhang, “Estimation of MIMO Transmit-Antenna Number Using Higher-Order Moments Based Hypothesis Testing,” IEEE Wireless Communications Letters, vol. 7, pp. 258-261, 2018.##
[5] O. A. Dobre, “Signal Identification for Emerging Intelligent Radios: Classical Problems and New Challenges,” IEEE Instrumentation & Measurement Magazine, vol. 18, pp. 11-18, 2015.##
[6] A. G. Soteh and H. K. Bizaki, “On the Analytical Solution of Rank Problem in the Convolutional Code Identification Context,” IEEE Communications Letters, vol. 20, pp. 442-445, 2016.##
[7] R. Swaminathan, A. Madhukumar, G. Wang, and T. S. Kee, “Blind Reconstruction of Reed-Solomon Encoder and Interleavers Over Noisy Environment,” IEEE Transactions on Broadcasting, vol. 64, pp. 830-845, 2018.##
[8] P. Yu, J. Li, and H. Peng, “A least square method for parameter estimation of RSC sub-codes of turbo codes,” IEEE Communications Letters, vol. 18, pp. 644-647, 2014.##
[9] A. Jamshidi, A. Keshavarz-Hadad, and F. Zare, “Estimation of Convolutional Interleaver Parameters in the Burst and BSC Channels,” Iranian Journal of Science and Technology, Transactions of Electrical Engineering, vol. 40, pp. 93-102, 2016.##
[10] S. Han and M. Zhang, “A Method for Blind Identification of a Scrambler Based on Matrix Analysis,” IEEE Communications Letters, vol. 22, pp. 2198-2201, 2018.##
[11] Y. Wang, X. Yun, M. Z. Shafiq, L. Wang, A. X. Liu, Z. Zhang, et al., “A Semantics Aware Approach to Automated Reverse Engineering Unknown Protocols,” in 20th IEEE International Conference on Network Protocols, pp. 1-10, 2012.##
[12] W. Cui, M. Peinado, K. Chen, H. J. Wang, and L. Irun-Briz, “Tupni: Automatic Reverse Engineering of Input Formats,” in 15th ACM conference on Computer and communications security, pp. 391-402, 2008.##
[13] Z. Lin, X. Jiang, D. Xu, and X. Zhang, “Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution,” in NDSS, pp. 1-15, 2008.##
[14] P. M. Comparetti, G. Wondracek, C. Kruegel, and E. Kirda, “Prospex: Protocol Specification Extraction,” in Security and Privacy, 2009 30th IEEE Symposium on, pp. 110-125, 2009.##
[15] G. Wondracek, P. M. Comparetti, C. Kruegel, E. Kirda, and S. S. S. Anna, “Automatic Network Protocol Analysis,” in NDSS, pp. 1-14, 2008.##
[16] M. McDaniel and M. H. Heydari, “Content Based File Type Detection Algorithms,” in 36th Annual Hawaii International Conference on System Sciences, p. 10, 2003.##
[17] W. C. Calhoun and D. Coles, “Predicting the Types of File Fragments,” digital investigation, vol. 5, pp. S14-S20, 2008.##
[18] Q. Zhang, L. T. Yang, Z. Chen, and F. Xia, “A High-Order Possibilistic C-Means Algorithm for Clustering Incomplete Multimedia Data,” IEEE Systems Journal, vol. 11, pp. 2160-2169, 2017.##